SO YOU WANT TO BE IN CYBER SECURITY?

Similar documents
Tampa Bay Chapter of ISSA Women in Security: Building for the Future Marci McCarthy, CEO & President, T.E.N.

Fast Facts About The Cyber Security Job Market

Pathways to Empowered Security Leadership

Bridging the Cybersecurity Talent Gap Cybersecurity Employment and Opportunities for Engagement

MassTLC Security Community Advisory Board Meeting JANUARY 15, 2016

Job Market Intelligence: Cybersecurity Jobs, Burning Glass Technologies

Cybersecurity. Employment Landscape Fortify Experts. All Rights Reserved.

Program Drill-Downs National

IT Workforce snapshot

Job Market Intelligence:

Program Drill-Downs Western New York

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide

About Our 2015 WTA Cyber Security Speakers and Sessions

Chapter 7 Securing Information Systems

White Paper: Why We Need Veterans for Critical Infrastructure Security

Helping Companies Build Great IT Departments Since 1981

How to profit from the growing shortage of IT professionals jobs

HOW TO START YOUR SUCCESSFUL CAREER IN SEARCH ENGINE OPTIMIZATION DIGITAL MARKETING

Contents. Ad Tech Big Data Creative Information Security. Marketing Media, Planning & Buying. Project Management & Client Services

Core Challenges in the Market for Cybersecurity Jobs

Just Ask: Strategies for Engaging and Retaining Help Desk Professionals

THE HR GUIDE TO IDENTIFYING HIGH-POTENTIALS

COMPENSATION REPORT FOR FINANCIAL PROFESSIONS WITH CANDIDATE RECRUITMENT INSIGHTS

Bridging the Security Governance Divide in Utilities

acsys recruitment MARKET SENSE 2015 TECHNOLOGY SENTIMENT, SALARY & RATES SURVEY

IT AND BUSINESS CHANGE

Cyber Security. Doug Houseman Engineering Consulting Research. Modeling Simulation Security. The Practical Grid Visionaries TM

IT Governance: The Directors Cut. What Directors Need to Know

Using Your Degree for Advancement in Management and Leadership. Walden University Career Services Center

The New Face of Risk Management

The Future Is SECURITY THAT MAKES A DIFFERENCE. Overview of the 20 Critical Controls. Dr. Eric Cole

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

ISACA S CYBERSECURITY NEXUS (CSX) October 2015

GRC Stack Research Sponsorship

Rising to the Challenge

O U R P R O B L E M S A R E H U M A N, S O A R E T H E S O L U T I O N S CLINICAL SETTINGS (INCLUDING PRIVATE PRACTICE)

Securing your Corporate Infrastructure What is really needed to keep your assets protected

Introduction: The Fastest-Growing Industry 6. Social Media Specialist 11. Software Tester 18. Website Developer 25. Database Administrator 33

Dallas, TX September 10. Chairman: Lance Spitzner

Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education

REAL ESTATE SALES SOLUTIONS A GREG HARRELSON SALES ACADEMY

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

US Cyber Challenge: Finding the people who canwin in cyberspace? Alan Paller Director of Research, SANS Institute

Getting Started in Cybersecurity: How to Hone Your Hacking Skills. Dr. Davina Pruitt-Mentle CyberWatch K12 Ed Tech Policy, Research and Outreach

Wrapping Audit Arms around the Cloud Georgia 2013 Conference for College and University Auditors

Security+ P a g e 1 of 5. 5-Day Instructor Led Course

January IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director

Organizational Structure What Works

Into the Breach Transitioning info an infosec career. Ray Pompon, CISSP

Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages

Network Consulting Engineer

BHEF s National Higher Education and Workforce Initiative

Healthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council

ICT and Networking Courses Prepare and Inspire Future Innovators

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

An initiative set up by the indigenous Irish

Careers for Physics Majors

Wanted: Senior IT staff member with a strong technical base and good project management and people skills.

snapshot IT Workforce IT Workforce snapshot subject HEALTHCARE

Enterprise Service Management (ESM)

Corporate Membership. For Solution Providers

How to Pursue a Career in Information Technology A QUICK REFERENCE GUIDE

UK Permanent Salary Index

Application Security Maturity Model

State of South Carolina InfoSec and Privacy Career Path Model

IT Workforce snapshot

Physics Careers: To the Bachelor s Degree and Beyond. Crystal Bailey American Physical Society

SRA 2011 Health System CIO Survey Report Trends, Advice and Salaries

Robert Brammer. Senior Advisor to the Internet2 CEO Internet2 NET+ Security Assessment Forum. 8 April 2014

SESSION 706 Wednesday, November 4, 9:00am - 10:00am Track: Framework Fusion

Real-Time Labor Market Information New Hampshire Computer and Information Technology Job Postings

Information Security Forum Sponsorship Programs

IT Salary Guide. Southern California. Released February 2015

Job Title Dublin Cork Regional

21ST CENTURY ELECTRICITY SYSTEM CEO FORUM SUMMARY

Why Certify? Why IT? Brian Matzelle

Network Security: What You and Your Skills Are Worth

UTCS Scholarships for Service

ISSA SILICON VALLEY SECURITY METRICS SO WHAT?

THE SANS INFORMATION SECURITY SALARY & CAREER ADVANCEMENT SURVEY

IT Workforce Survey, 2015

BAY AREA COMMUNITY COLLEGE CONSORTIUM REQUEST FOR PROGRAM ENDORSEMENT - NEW CREDIT PROGRAM

Introduction to NICE Cybersecurity Workforce Framework

Strategic Progress Update July 2014 March 2015

Top Job Postings in Metro Atlanta: Old Economy Meets New Economy

Personal Security Practices of the CAO

Headhunting Top Talent. Fast.

Networking and Information Security

Applied Security Metrics

State of US Salaries Report

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

Preparing the Cybersecurity Workforce Through Creative Partnering

Expert Reference Series of White Papers. Planning a Career Path in Cybersecurity

Defending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014

Preparing for Performance Building the Cybersecurity Workforce We Need. Maurice Uenuma 13 November 2013

CompTIA Tools & Resources for the JD-NEG Program

TABLE OF CONTENTS ABOUT MARTINSEN MAYER 2 ABOUT THE SURVEY 2 GENERAL TRENDS MOUNA KENZAOUI, CEO 3 EXECUTIVE 4 ACCOUNTANCY AND FINANCE 6 BANKING 8

The Hunt for Fraud. September 25, Seminar / Training. September 26, 2014

Full-Speed Ahead: The Demand for Security Certification by James R. Wade

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

Transcription:

SO YOU WANT TO BE IN CYBER SECURITY? A boy comes to me with a spark of interest, I feed that spark and it becomes a flame, I feed the flame and it becomes a fire, I fed the fire and it becomes a roaring blaze. ~Cus D Amato

//CYBER SECURITY The interconnection and reliance of physical lifeline functions over the Internet (cyberspace) that impacts our: National Security Public Health and Safety Economic well-being 2

WHY CYBER SECURITY IS A GOOD FIELD The cyber security industry is booming 0% unemployment rate for qualified cyber security professionals ~Phil Agcaoili Information security jobs are expected to grow by 53% through 2018 Bureau of Labor Statistics Average annual salary is $116,000 a year for a cyber security worker Semper Secure survey 25% of all organizations claim to have a problematic shortage of information security skills Network World, 2014 Among the most sought-after professionals in the tech sector, with demand for workers in cyber security field outpacing other IT jobs by a wide margin. CIO Magazine 2014 Demand for cybersecurity profs has grown more than 3.5x faster than the demand for other IT jobs over the past 5 years and more than 12x faster than the demand for all other non-it jobs. Current staffing shortages are estimated between 20,000 and 40,000 and are expected to continue for years to come. Burning Glass International Critical need to fill 50,000 cyber security jobs in the near future in the federal government and private industry Washington Post 2012 3

CYBER SECURITY CAREER OPTIONS Board of Directors CEO Corporate Governance Leader CFO COO GC Internal Audit Leader Operations Leader CSO Audit Management Risk Management Compliance Management Auditor Governance Analyst Risk Analyst Compliance Analyst IT Roles Network Administrator System Administrator Network Management Database Administrator Developer and QA CIO CISO Physical Security Management Information Security Management Risk Management Fraud Management Program Management Project Management Officer Investigator Loss Prevention Fraud Analyst Security Strategist/Principle Security Architect Security Engineer Security Analyst Security Administrator Specialty Roles Security Assurance Penetration Tester eforensics and Litigation Support Threat Intelligence Application Security Security Software Developer Identity Management Cryptographer Founder Security is a field of Service, Ethics, and Integrity CTO Product Leader Service Leader Product Management Services Management Technologist Strategist Analyst Managing Consultant Consultant 4

*TOP 10 CYBER SECURITY JOB TITLES Security Engineer Security Analyst Information Security Analyst Information Security Engineer Network Security Engineer Information Technology Security Analyst Information Security Manager Information Assurance Engineer Senior IT Auditor Security Administrator *UMUC.edu study 5

*IN-DEMAND SKILLS FOR CYBER SECURITY JOBS Employers are seeking to hire employees with proficiency in: Firewalls Network Security LINUX UNIX CISA Cryptography Cisco Transmission Control Protocol/Internet Protocol (TCP/IP) System and Network Configuration Scanners 4 out of 5 Cyber Security Jobs Require a Degree Burning Glass International 2013 *UMUC.edu study 6

*TOP 5 REGIONS FOR CYBER SECURITY JOBS Palo Alto, California San Francisco, California Baltimore, Maryland Boston, Massachusetts Denver, Colorado Metropolitan areas *UMUC.edu study 7

Information Security Certifications 8

HOW I GOT HERE Our bravest and best lessons are not learned through success, but through misadventure. ~Amos Bronson Alcott I have no special talent. I am only passionately curious. ~Albert Einstein 9

HOW DO I GET STARTED? Experience. Experience. Experience. Systems administrator Network administrator Database administrator Software development Quality Assurance Project management Audit Penetration testing Ask Gain experience. 10

Hope is not a plan. 11

Typical Career Trajectory Excel in high school science Major in science in college and excel Go to grad school because that s what excellent students do Hang on for six years or more, get PhD Do a postdoc Hit the wall Scramble to find any job you can Hope to someday be happy versus Mythical Career Trajectory Excel in high school science Major in science in college and excel Go to grad school, get Ph.D. in 4 years Do a postdoc for 2 years Publish 5-7 papers Decide which tenuretrack offer to accept at age 28 Rise through the faculty ranks, tenure by 38 12

TYPICAL CAREER TRAJECTORY Cyber security has been like this for me and many others. 13

BETTER CAREER TRAJECTORY Excel in school, maybe get a Ph.D. and then start a postdoc because it furthers your career Explore a variety of career options Decide what fits your personality best Set goals and work hard Find a job that is challenging, rewarding and satisfying to YOU 14

SOME THOUGHTS ON WHAT DRIVES US Autonomy Mastery Purpose Independence Purpose - Service Happiness Thanks, Mom and Dad! 15

16

WHY PLAN YOUR CAREER? You are responsible for your own career. Jobs are not permanent. Increase your chances of job satisfaction. 17

WHY IS CAREER PLANNING HARD? No sense of urgency Leads to difficult life questions Sets goals and increases stress Uncovers unexamined career assumptions 18

TWO HABITS OF HIGHLY EFFECTIVE CAREER PLANNING Begin With the End in Mind If you can t see yourself as successful, you have already failed. Where do you want to be 1, 3, 5, and 10 years from now? What experiences do you want? Put First Things First You can t do everything, prioritize your goals. Begin where you are right now. Consider assignments or projects that you would like, as well as jobs or positions. Include opportunities where you can contribute and learn. An essential aspect of creativity is not being afraid to fail. ~Edwin Land, Founder of Polaroid 19

CLOSING THOUGHTS Your time is limited, so don't waste it living someone else's life. Don't be trapped by dogma - which is living with the results of other people's thinking. Don't let the noise of others' opinions drown out your own inner voice. And most important, have the courage to follow your heart and intuition. Steve Jobs 20

Phil Agcaoili Thanks Contributor, NIST Cybersecurity Framework version 1 Co-Founder & Board Member, Southern CISO Security Council Distinguished Fellow and Fellows Chairman, Ponemon Institute Founding Member, Cloud Security Alliance (CSA) Inventor & Co-Author, CSA Cloud Controls Matrix, GRC Stack, Security, Trust and Assurance Registry (STAR), and CSA Open Certification Framework (OCF) @hacksec https://www.linkedin.com/in/phila 21